mikepurvis
6 days ago
So this is a configuration linter; what I was hoping it might be is something that provides live auditd notices for when a tailscale user connects by SSH to a common "admin" account.
The tailscale daemon definitely knows which user it is making the connection, as it publishes that info into the journal and I've seen people scrape it out of there, but I'd much rather it go through a structured reporting pipeline. AFAICT, tailscale itself provides several things that look like they're this, but aren't quite the right thing, for example https://tailscale.com/kb/1203/audit-logging is about logging changes to the tailnet itself (eg adding nodes), and https://tailscale.com/kb/1246/tailscale-ssh-session-recordin... is recording the ssh sessions rather than simple events for XYZ logged in / XYZ session idle / XYZ disconnected.
(And yes, I know people have opinions about common admin accounts, but tailscale is another route into what FB described as far as everyone accessing the same root account but doing so with their own credentials [good!] rather than a shared key [very bad!]: https://engineering.fb.com/2016/09/12/security/scalable-and-...)
raggi
6 days ago
sbinnee
6 days ago
I see how the power of HN community manifests. Really cool work!
mikepurvis
6 days ago
Holy cow. Well... that's awesome. Thanks so much!
aberoham
6 days ago
It sounds like you want the sort of logs that Teleport captures https://github.com/gravitational/teleport
mikepurvis
6 days ago
I guess so, yeah, though that sounds like that's a whole separate ecosystem, and positions itself as a direct competitor:
https://goteleport.com/compare/tailscale-alternative/
OTOH, a lot of people who think they need a VPN really just need tunneling and authenticated access, so I can see the pitch for why Teleport's offering is a fit for many users who would otherwise consider tailscale.
debarshri
6 days ago
Theres more to it. This falls into the realm of privileged access management. I think if you are critical infrastructure, financial institution, healthcare tech. This is non negotiable and it is part of your compliances. Just VPN do not cut it out. At adaptive [1], we do the same for server, databases and kubernetes clusters. It is a double digit billion dollar TAM.
user
6 days ago
tptacek
6 days ago
Not really? We use Teleport behind Tailscale.
thesubtlety
6 days ago
Oh that's a cool idea. Super useful for detection and response teams, guessing they're able to get some of that by standard OS telemetry via agents/EDR.
mikepurvis
6 days ago
Having an audit trail is really important for medium-sized shops where a lot of senior devs still have the keys to prod and kind of need to as they're still the defacto ops team and have to be able to get in quickly to investigate faults or poke at systems to get them back online.
At the same time, when something is left in a bad state, you want to know how it got that way and when; not even necessarily just to punish people, but so that the right people are in the room to explain the full circumstances of what they did and why.